timetracker
Example
{config, ...}: {
timetracker = {
enable = true;
secretKeyFile = config.sops.secrets."timetracker/secret_key".path;
db.passwordFile = config.sops.secrets."timetracker/db_password".path;
oidc = {
enable = true;
clientSecretFile = config.sops.secrets."timetracker/authelia/client_secret".path;
clientSecretHash = "$pbkdf2-sha512$...";
};
};
}Stack Options
nps.stacks.timetracker.containers.timetracker
Alias of {option}services.podman.containers.timetracker.
nps.stacks.timetracker.db.passwordFile
The file containing the PostgreSQL password for the database. Only used if db.type is set to "postgres".
nps.stacks.timetracker.db.type
Type of the database to use.
Can be set to "sqlite" or "postgres".
If set to "postgres", the passwordFile option must be set.
value "postgres" (singular enum)
"postgres"
nps.stacks.timetracker.db.username
The PostgreSQL user to use for the database. Only used if db.type is set to "postgres".
nps.stacks.timetracker.enable
Whether to enable timetracker.
nps.stacks.timetracker.oidc.adminGroup
Users of this group will be assigned admin rights
nps.stacks.timetracker.oidc.clientSecretFile
The file containing the client secret for the OIDC client that will be registered in Authelia.
nps.stacks.timetracker.oidc.clientSecretHash
The hashed client_secret. Will be set in the Authelia client config. For examples on how to generate a client secret, see
https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#client-secret
nps.stacks.timetracker.oidc.enable
Whether to enable OIDC login with Authelia. This will register an OIDC client in Authelia and setup the necessary configuration.
For details, see:
nps.stacks.timetracker.oidc.userGroup
Users of this group will be able to log in
nps.stacks.timetracker.secretKeyFile
Path to the file containing the secret key for flask